{"title":"利用stackelberg监测策略防御无线传感器网络中的干扰攻击","authors":"E. Karapistoli, A. Economides","doi":"10.1109/ICCCHINA.2014.7008264","DOIUrl":null,"url":null,"abstract":"Due to their unattended and broadcast nature wireless sensor networks (WSNs) are vulnerable to various types of attacks, among which a particularly harmful form of attack, the jamming attack. Game theory provides robust tools to model and investigate such attacks. In this paper, we study a class of such jamming games played at the physical layer among a set of monitor nodes and the jammer. We formulate the problem using a Bayesian Stackelberg game. The derived Stackelberg equilibrium strategies define the expected performance of the defender under jamming attacks, and motivate a security-aware protocol design for this type of wireless networks. Different network scenarios are studied to illustrate that the proposed game theoretic approach significantly reduces the ability of the attacker to jam the network.","PeriodicalId":353402,"journal":{"name":"2014 IEEE/CIC International Conference on Communications in China (ICCC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Defending jamming attacks in wireless sensor networks using stackelberg monitoring strategies\",\"authors\":\"E. Karapistoli, A. Economides\",\"doi\":\"10.1109/ICCCHINA.2014.7008264\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Due to their unattended and broadcast nature wireless sensor networks (WSNs) are vulnerable to various types of attacks, among which a particularly harmful form of attack, the jamming attack. Game theory provides robust tools to model and investigate such attacks. In this paper, we study a class of such jamming games played at the physical layer among a set of monitor nodes and the jammer. We formulate the problem using a Bayesian Stackelberg game. The derived Stackelberg equilibrium strategies define the expected performance of the defender under jamming attacks, and motivate a security-aware protocol design for this type of wireless networks. Different network scenarios are studied to illustrate that the proposed game theoretic approach significantly reduces the ability of the attacker to jam the network.\",\"PeriodicalId\":353402,\"journal\":{\"name\":\"2014 IEEE/CIC International Conference on Communications in China (ICCC)\",\"volume\":\"44 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 IEEE/CIC International Conference on Communications in China (ICCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCHINA.2014.7008264\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE/CIC International Conference on Communications in China (ICCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCHINA.2014.7008264","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Defending jamming attacks in wireless sensor networks using stackelberg monitoring strategies
Due to their unattended and broadcast nature wireless sensor networks (WSNs) are vulnerable to various types of attacks, among which a particularly harmful form of attack, the jamming attack. Game theory provides robust tools to model and investigate such attacks. In this paper, we study a class of such jamming games played at the physical layer among a set of monitor nodes and the jammer. We formulate the problem using a Bayesian Stackelberg game. The derived Stackelberg equilibrium strategies define the expected performance of the defender under jamming attacks, and motivate a security-aware protocol design for this type of wireless networks. Different network scenarios are studied to illustrate that the proposed game theoretic approach significantly reduces the ability of the attacker to jam the network.